[1]
Y. . Gorbenko and S. . Kandii, “Comparison of security arguments of promising key encapsulation mechanisms”, RT, vol. 3, no. 210, pp. 22–36, Sep. 2022.